Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

krb5_newrealm(8) [debian man page]

krb5_newrealm(8)					      System Manager's Manual						  krb5_newrealm(8)

NAME
krb5_newrealm -- Create a new Kerberos Realm SYNOPSIS
krb5_newrealm Description This script attempts to create a Kerberos realm. It assumes that none of the realm components exists, except for the /etc/krb5.conf file. (Normally this file is automatically generated at package installation, but if you skipped the configuration step, you will need to manu- ally generate this file before running krb5_newrealm.) It creates the database, initializes the stash file in /etc/krb5kdc/stash contain- ing the master key for the database, starts the KDC and Kerberos admin server, and creates a stub /etc/krb5kdc/kadm5.acl file. krb5_newrealm(8)

Check Out this Related Man Page

krb5kdc(1M)															       krb5kdc(1M)

NAME
krb5kdc - KDC daemon SYNOPSIS
/usr/lib/krb5/krb5kdc [-d dbpath] [-r realm] [-R replaycachename] [-m] [-k masterenctype] [-M masterkeyname] [-p port] [-n] krb5kdc is the daemon that runs on the master and slave KDCs to process the Kerberos tickets. For Kerberos to function properly, krb5kdc must be running on at least one KDC that the Kerberos clients can access. Prior to running krb5kdc, you must initialize the Kerberos data- base using kdb5_util(1M). See the for information regarding how to set up KDCs and initialize the Kerberos database. The following options are supported: -d dbpath Specify the path to the database; default value is /var/krb5. -k masterenctype Specify the encryption type for encrypting the database. The default value is des-cbc-crc. des3-cbc-sha1, arcfour- hmac-md5, arcfour-hmac-md5-exp, aes128-cts-hmac-sha1-96, and aes256-cts-hmac-sha1-96 are also valid. -m Specify that the master key for the database is to be entered manually. -M masterkeyname Specify the principal to retrieve the master Key for the database. -n Specify that krb5kdc should not detach from the terminal. -p port Specify the port that will be used by the KDC to listen for incoming requests. -r realm Specify the realm name; default is the local realm name. -R replaycachename Specify the replay cache name; default value is krb5kdc_rcache. /var/krb5/principal.db Kerberos principal database. /var/krb5/principal.kadm5 Kerberos administrative database. This file contains policy information. /var/krb5/principal.kadm5.lock Kerberos administrative database lock file. This file works backwards from most other lock files (that is, kadmin will exit with an error if this file does not exist). /etc/krb5/kdc.conf KDC configuration file. This file is read at startup. /etc/krb5/kpropd.acl File that defines the access control list for propagating the Kerberos database using kprop. See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWkdcu | +-----------------------------+-----------------------------+ kill(1), kpasswd(1), gkadmin(1M), kadmind(1M), kadmin.local(1M), kdb5_util(1M), logadm(1M), krb5.conf(4), attributes(5), krb5envvar(5), SEAM(5), NOTES
The following signal has the specified effect when sent to the server process using the kill(1)command: SIGHUP krb5kdc closes and re-opens log files that it directly opens. This can be useful for external log-rotation utili- ties such as logadm(1M). If this method is used for log file rotation, set the krb5.conf(4) kdc_rotate period rela- tion to never. 11 Jul 2005 krb5kdc(1M)
Man Page